Photos

Wednesday, July 30, 2008

Duradoy Hewi was the reigning WBC, WBA, IBF, WBO found for found (FFF) boxer in the world and then retired because he wants his career to shine more like a star. With his popularity, various business sectors have solicited Hewi's help in endorsing their products through commercial advertisements in print and in broadcast. These include okay-okay (used clothing), food supplements, sports, telecommunications, and even a political ad for most corrupt Brgy. Captain Dodong Saltip a.k.a Salinsatipus during the Feb 29, 2001 elections.

Hewi is lending his talent to the last installment in DamgoTrabaho animated hit series Stroke, repeating his role as the voice of Prince Pana. Later this year, Hewi will star in "Boxing is just for fans", an action comedy from Sunny Pictures.

Tired of exchanging links and reading latest blogs? Here is the newest game for you all bloggers around the world. Stay a bit of this "Name The Differences" game. This game is all about computer and its peripherals. If you are a computer blogger, im sure you can list down all the diffences of the above picture. There are eleven (11) things which do not belong to computer technology, peripherals and computer tools, (note: please exclude the floor mat. hehehe). Please list down all of these eleven things you see on the above picture and the answers will be place in your comment below for your hearty answers :-). This is just for fun. I know some of you here have eyes' strain. Well, its time to boggle your mind a moment. Let's start the game. No time limit of one (1) minute. hehehe ex. 1. comb2. ? to 11 ?

Tuesday, July 29, 2008

Hi everyone, I have observed some of the bloggers around the world were Filipina. As I travelled the speed of light in a wild and witnessed the links and sites I visited, some Filipina were married from different races like Americans, Dutches, and some are to Asians. I hope as they migrate to different places they won't be experiencing culture shock. lol. Wow! Filipina are really nice bloggers. I know some Filipina are caring, thoughtful, hospitable and all the positive aspects as you see and discover who really true Filipina are, can be found only here in the Philippines. Well, some pinay are lucky and some are not. Some got divorced and some continued their happy married lives to unlike cultures.

How I wish I can marry to "not like ours". lols. If given a chance, I want to marry a unique personality. Not an Americans, Dutches or whatsoever. I want to marry an Antarticanian because I found it so unique. Maybe in a cold regions of the southern hemisphere, A Penguin. lol

A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard. As a hardware device, a keylogger is a small battery-sized plug that serves as a connector between the user's keyboard and computer. Because the device resembles an ordinary keyboard plug, it is relatively easy for someone who wants to monitor a user's behavior to physically hide such a device "in plain sight." (It also helps that most workstation keyboards plug into the back of the computer.) As the user types, the device collects each keystroke and saves it as text in its own miniature hard drive. At a later point in time, the person who installed the keylogger must return and physically remove the device in order to access the information the device has gathered.A keylogger program does not require physical access to the user's computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.Although keylogger programs are promoted for benign purposes like allowing parents to monitor their children's whereabouts on the Internet, most privacy advocates agree that the potential for abuse is so great that legislation should be enacted to clearly make the unauthorized use of keyloggers a criminal offense.Source: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci962518,00.html

Saturday, July 26, 2008

Hey guys, wazup! Wanna be a CISCO certified? I guess all IT professionals want to become CISCO certified, right? yeah, you write! I know not much about computer technology but im craving to become one of those multi-talented geeks out there. (a geek?, sounds like ew to me!hehehe)

It is a huge help for us if you want to share your ideas, suggestions and comments here regarding CISCO certification. Please tell us the magic on how to become one of them.

The members of the band met in the halls of residence at the University College London in September 1996.

Martin and Buckland were the first members of the band, having met one another during freshers' week. They spent the rest of the year planning a band; at one point Martin had considered forming an *NSYNC inspired boy band called Pectoralz.

Eventually, Berryman joined the ranks, without consideration of what musical direction the band was taking. On 8 January 1998, the band's line-up was complete when Champion joined the band to take up percussion duties. The multi-talented Champion had grown up playing piano, guitar, bass, and tin whistle; he quickly learned the drums, despite having no previous experience with that instrument. At the time, the band performed under the name Starfish.

Eventually, they took the name Coldplay from a mutual friend, Tim, who had his own band. According to Martin, "He (Tim) decided he didn't like the name anymore because it was too depressing." In 1998, Coldplay was performing small club gigs for local Camden promoters.

Wanting more creative freedom, Martin recruited fellow student and childhood friend Phil Harvey to act as band manager. Harvey helped the band raise money needed to record a demo. Harvey managed the band up until and including the release of their debut album Parachutes.

I've heard and saw once in the movie, Coldplay was mentioned but sorry to inform you guys, I forgot the title and the person who said that, but I guess that genre was a comedy. The actor of that movie said "You like Coldplay then you're a gay" . lol. I dont have an idea why they plugged Coldplay, is it because they want to drag down or promote them? Coldplay is one of the best band I like. Hey! im not a gay. Charing!! pag xure oi !!

Tuesday, July 22, 2008

This is how it looks sometimes when fixing a PC. You need to have a screw driver, a back up files from your hard drive and the installers. It is not necessary to have a laptop beside you while fixing an obsolete and running in a good condition socket 478 processor . The important is you have done a good job.

Sunday, July 20, 2008

U2, Irish rock music band, which achieved worldwide popularity during the 1980s and 1990s. The group was formed in 1976 at a high school in Dublin, Ireland, by four students: vocalist Paul Hewson, known as Bono; guitarist David Evans, known as The Edge; bassist Adam Clayton; and drummer Larry Mullen, Jr. The band won a school talent contest in 1978, began playing in local clubs, and in 1980 released its debut album, Boy.

For me, Stuck in a moment is one of the best song. What is U2's best song for you?

The designers gave a nod to the velocity of innovation when they matched the heritage of Ducati with the authenticity of Oakley. This rare breed features the laser-etched script logo that dominates World Superbike Championships. Highlighted with Ducati colors, the lightweight O MATTER® sunglasses achieve a comfortable Three-Point Fit. The patented innovations of HIGH DEFINITION OPTICS® (HDO®) offer unbeatable clarity and impact resistance that meets ANSI Z87.1 standards. Contours extend peripheral view while pure PLUTONITE® lens material filters out 100% of all UV, not just UVA and UVB.

Friday, July 18, 2008

You know who's this girl beside me? naahh! I don't know her either. I met her once at Disneyland Hongkong last May 2006. That was the first and last time I saw her. She took a picture together with me because she requested me to posed with her. I was devastated then of her lovely face and wasn't able to get her name. So unfortunate. Any information about her whereabouts please contact me thru e-mail. hehehe

Wednesday, July 16, 2008

Rottweiler - breed of working dog, probably descended from a herding dog used by the Roman armies to drive their cattle and to guard their camps. Rottweilers are fairly large, strongly built, and intelligent, making excellent guard dogs. The short, coarse, flat hair is black, with tan to dark brown markings. The tail is short and carried horizontally. Males stand about 61 to 69 cm (about 24 to 27 in), females about 56 to 66 cm (about 22 to 26 in).

Labrador Retriever - breed of sporting dog, trained to discover and fetch killed or wounded game, principally aquatic birds or pheasants. The male is 58 to 64 cm (23 to 25 in) high at the shoulder and weighs 27 to 34 kg (60 to 75 lb); the female is somewhat smaller. The dog has a short and exceedingly dense black, yellow, or chocolate-colored coat that is almost impervious to water. It has a wide skull, medium-sized ears hanging fairly close to the head, eyes that are usually black or brown, a wide, deep chest, and straight legs. The characteristic “otter” tail of the Labrador retriever is of medium length, very thick at the base, and tapering gradually to the tip. The tail is covered thickly with the same kind of short, dense hair that is found in the coat.

These two dogs, Mr. Rottweiler - a 4 year old dog is base in Cebu City and have won many awards in Dog Show competition trained by Boyet, a Vet Med from Cebu. Chloe is the name of the dog, he visited Davao City last May 2008 for another dog show. Wala ko kabalo kung ni daog ba. The other dog, Ms. Labrador Retriever - the 7 week old (see above picture) yellow Labrador Retriever baptized the named Caira. Caira was also from Cebu and brought by my sister in Davao City as her new pet. She turns 3 months now og pastang kiata aning irua. Caira learns basic instruction and commands like sit down and to behave. (bark 3 times 6 = 18, jump as high as 18 foot wheeler, roll over till she drop and roar like a lion are the challenging instructions must she learns now.) She also instructed and taught how to bite back biters and kill dogs. joke!!

From remote - describes other vulnerabilities where the attack vector doesn't require access to the system or a local network. This category covers services that are acceptable to expose to the Internet (e.g. HTTP, HTTPS, SMTP). It also covers client applications used on the Internet and certain vulnerabilities where it is reasonable to assume that a security conscious user can be tricked into performing certain actions.

System access - This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

Vulnerability is a type of active threat found in your computer system. Most of these objects can be found in Program Files where .exe, .dll and more are critically very and highly dangerous when infected. The vulnerability is caused due to an error in the object handler when parsing object header data. This can be exploited to corrupt memory

Tuesday, July 15, 2008

3G or third generation, is the generic term used for the next generation of mobile communications systems. The new systems will enhance the services available today and offer multimedia and internet access and the ability to view video footage.

iPhone 3G. With fast 3G wireless technology, GPS mapping, support for enterprise features like Microsoft Exchange, and the new App Store, iPhone 3G puts even more features at your fingertips. And like the original iPhone, it combines three products in one — a revolutionary phone, a widescreen iPod, and a breakthrough Internet device with rich HTML email and a desktop-class web browser.

I'll buy this iPhone by the time it will be launched here in the Philippines. I heard from the news that Globe telecom is the first telecommunication company to introduce it to the public. From now on I will start soliciting money from the street where I live. (crying out loud!)

This is the reason why I come to where the flavor is. Ducati Super Bike 848 is in my wishlists. I dream of having this machine because of its famous Italian name Ducati and the daredevil speed it has. I am not a risk-addict but I might become one if I keep this someday. bwehehe!

Come to where the flavor is - Is the famous ads of Marlboro cigarette. Buying a pack of Marlboro has a chance of winning the grand prize of Ducati bike. Well, maybe you thought of me a frequent smoker of cigarette. Ngee!! dili intawon! panagsa lang oi. I smoked occasionally but not too much of two sticks if there's only an occasion. I bought 7 packs of Marlboro the last 3 days before the grand draw was held and im hoping for a lucky pick. Fortunately, I didn't use to smoke some of the 7 packs I bought due to the government warning - cigarette smoking is dangerous to your wallhealth. hehehe

Four days after the grand draw I logged on to the Marlboro site and looked for the big winner. Sad to say, I found no life of my name except the name of MikeBuhay who was the big winner of Ducati from Makati.

The life of Mike now is Makulay Ang Buhay Sa Sinabawang Marlboro. (joke!) and Congrats.

Sunday, July 13, 2008

My watch alarmed me to fix myself and ready to go for my client’s another PC problem. I drove 35 miles from where I stayed just to go there and meet the guy for his concern. As I arrived, he offered me a coffee drink and talked for a while where we discussed a lot of his concerns regarding PC and internet connection. After we’ve talked, I started fixing his computer and installing all the programs that he has. After I finished installing all the programs, I configured the internet connection and got connected, I started downloading software from the website where it took 3 hours for me to finish one application not because of the traffic but the creeping speed of the internet connection. Such a waste of time for me to stay there waiting to finish the download. PLDT myDSL helped me to check the internet connection of my client. The bandwidth test result of my client’s connection was only 27.6 kbps and it can download 3.45 kbps where he subcribed a connection speed of 128kbps. Huh! How was this happened? What causes the given bandwidth from the provider, why it couldn’t meet the subscriber’s ideal speed of 128 kbps? For him, a broadband of 128 kbps is enough because his purpose is to check e-mail and browse interesting sites. For me having a 128 kbps is enough but the speed of dial-up is a damn thing agreed by the internet provider where you subcribe a broadband connection. It would be great for my client if the provider give the best connection of 128 kbps rather than dial-up or greater than ISDN.

What is a Widgenie Power? Widgenie is a powerful widget created by you to visualize and share information. This can be things like a table, pie chart, bar chart, line chart, and many more choices to come.If you have the opportunity, feel free to register for a free account. I’d greatly appreciate it if you took a look . The website is http://www.widgenie.com/.

This blog is a personal blog written and edited by me. This blog accepts forms of cash advertising, sponsorship, paid insertions or other forms of compensation. This blog abides by word of mouth marketing standards. We believe in honesty of relationship, opinion and identity. The compensation received may influence the advertising content, topics or posts made in this blog. That content, advertising space or post will be clearly identified as paid or sponsored content.The owner(s) of this blog is compensated to provide opinion on products, services, websites and various other topics. Even though the owner(s) of this blog receives compensation for our posts or advertisements, we always give our honest opinions, findings, beliefs, or experiences on those topics or products. The views and opinions expressed on this blog are purely the bloggers' own. Any product claim, statistic, quote or other representation about a product or service should be verified with the manufacturer, provider or party in question.The owner(s) of this blog would like to disclose the following existing relationships. These are companies, organizations or individuals that may have a significant impact on the content of this blog. If you have questions please leave a message at my profile section.To get your own policy, go to http://www.disclosurepolicy.org/

The person named Sheila was my officemate, she was the sales representative of Panasonic product selling from small to big items like video player to refrigerator. She looks gorgeous with the dress she wear and everytime she gets in to the office, some other officemates can’t keep their eyes on her, staring monstrously. It’s just like they want to eat the Sheila. hehehe. Well, guys you know what I mean.

One day, a walk-in customer got in to the store and purchased a Panasonic digicam, Sheila was the sales representative of that item and she was in charge of demoing the item to the customer. Since Sheila was newly hired, she didn’t know well about the product. Meanwhile, I offered a hand to Sheila to demo the digicam to the customer. As I started explaining to the customer about the digicam, Sheila kept on listening and acquired more information from me on what I had discussed while myself was pretending to be busy. Sheila didn’t notice that I started capturing few clips from her. She didn’t realize that I am filming her, she thought only of having taking pictures where she posed candidly. Days had past, I uploaded the video from the digicam, Sheila got astonished when she saw her face on Youtube. She couldn’t believed why she was there and how she got there. She giggled so much and thought of becoming a Youtube Star until she went over the clips that I made and scented that her name was changed from Sheila to Duraday. Until such time, all of us in the office called her Duraday that made her faint-hearted.

The newly baptized name Duraday is keeping her attitute lovely and maintining her gorgeous posture of becoming a star and socialite where a lot of guys dreaming to marry her someday.

Each year, more and more viruses, worms, and Trojan horses are dimensioned and discharged into the untamed world of internet. Set outing anti-virus software on your desktops and servers is all well and good, but if your users don’t know the “rules of assignation,” your virus prevention efforts could be for nothing. (pag xure oi !! ew! xure na gyud ni yot!) ok continue blogging…

How safe is your PC from these antiviruses? Here are some list of antiviruses that I have tried and their business overviews.

Kaspersky - Founded in 1997, Kaspersky Lab is an international information security software vendor. Kaspersky Lab is headquartered in Moscow, Russia and has regional offices in the UK, France, Germany, the Netherlands, Poland, Japan, China, Korea, Romania and the United States. Further expanding the company’s reach is its large partner network comprising over 500 companies globally.

Norton from Symantec - symantec is a global leader in infrastructure software, enabling businesses and consumers to have confidence in a connected world. The company helps customers protect their infrastructure, information and interactions by delivering software and services that address risks to security, availability, compliance and performance. Headquartered in Cupertino, Calif., Symantec has operations in more than 40 countries.

McAfee - is the world’s largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that secure systems and networks around the world, allowing users to browse and shop the Web securely. With our unmatched security expertise and commitment to innovation, McAfee helps home users, businesses, the public sector and service providers to comply with regulations, protect data, prevent disruptions, identify vulnerabilities and continuously monitor and improve their security. Our products are unique in how they work together to make securityaffordable and manageable. These days, the threats are tougher, and the perpetrators are trickier. But as we have for more than 20 years, McAfee delivers superior protection that is trusted by millions of people.

AVG - Founded in 1991, with corporate offices in Europe, the US and the UK, AVG is focused on providing home and business computer users with the most comprehensive and proactive protection against computer security threats.With more than 70 million active users around the world, the AVG family of security software products is distributed globally through resellers and through the Web and supports all major operating systems and platforms.

Lists of viruses found in my computer. (hehehhe) A big thanks to my pro GUARDIAN.

Originally found gnawing at the roots of the World Tree during an excavation, this magnificent Chimaera’s age is impossible to determine. With his large snapping heads and agressive, unpredictable behavior, Jakiro is an intimidating creature to say the least, yet in loyal to the Sentinel for reasons all his own. Due to his strange mystical nature, he has a strange affinity with the element forces of ice and fire, allows him to devastate all he sees before him, and is more than capable of keeping a targets enemy in his line of fury. The Scourge would do best to be wary of this dragon, lest they all freeze and shatter as their precious Frozen Throne melts before their eyes.

This policy is valid from 28 August 2008
This blog is a personal blog written and edited by me. This blog accepts forms of cash advertising, sponsorship, paid insertions or other forms of compensation.
This blog abides by word of mouth marketing standards. We believe in honesty of relationship, opinion and identity. The compensation received may influence the advertising content, topics or posts made in this blog. That content, advertising space or post will be clearly identified as paid or sponsored content.
The owner(s) of this blog is compensated to provide opinion on products, services, websites and various other topics. Even though the owner(s) of this blog receives compensation for our posts or advertisements, we always give our honest opinions, findings, beliefs, or experiences on those topics or products. The views and opinions expressed on this blog are purely the bloggers' own. Any product claim, statistic, quote or other representation about a product or service should be verified with the manufacturer, provider or party in question.
The owner(s) of this blog would like to disclose the following existing relationships. These are companies, organizations or individuals that may have a significant impact on the content of this blog.
To get your own policy, go to http://www.disclosurepolicy.org